{"title":"Exploration of Schemes for Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptosystem","authors":"Dr.Sonali Nimbhorkar(Ridhorkar), L. Malik","doi":"10.1109/ICETET.2013.42","DOIUrl":null,"url":null,"abstract":"Wireless technology has become more persistent with wide demand of mobile devices such as personal digital assistance, smart phones and laptops. The elliptic curve cryptography(ECC) techniques provide greater security using fewer bits resulting in a protocol which requires low computational and communication overhead, therefore suitable for wireless communication system as well as wireless communication devices smart cards, PDAs and other handheld devices. These systems are prone to eavesdropping due to easy access to free space medium. In such cases, appropriate authenticity and cryptographic procedures need to be adopted for reliable and secure communication. Key agreement protocol based on elliptic curve cryptography suited for wireless network. This paper describes various schemes used for implementation of authenticated key agreement protocol in wireless network.","PeriodicalId":440967,"journal":{"name":"2013 6th International Conference on Emerging Trends in Engineering and Technology","volume":"51 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 6th International Conference on Emerging Trends in Engineering and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICETET.2013.42","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Wireless technology has become more persistent with wide demand of mobile devices such as personal digital assistance, smart phones and laptops. The elliptic curve cryptography(ECC) techniques provide greater security using fewer bits resulting in a protocol which requires low computational and communication overhead, therefore suitable for wireless communication system as well as wireless communication devices smart cards, PDAs and other handheld devices. These systems are prone to eavesdropping due to easy access to free space medium. In such cases, appropriate authenticity and cryptographic procedures need to be adopted for reliable and secure communication. Key agreement protocol based on elliptic curve cryptography suited for wireless network. This paper describes various schemes used for implementation of authenticated key agreement protocol in wireless network.